咨询与建议

限定检索结果

文献类型

  • 12,547 篇 期刊文献
  • 12,187 篇 会议
  • 119 册 图书

馆藏范围

  • 24,853 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,940 篇 工学
    • 10,464 篇 计算机科学与技术...
    • 8,711 篇 软件工程
    • 3,166 篇 信息与通信工程
    • 2,392 篇 生物工程
    • 1,923 篇 生物医学工程(可授...
    • 1,898 篇 控制科学与工程
    • 1,786 篇 电气工程
    • 1,420 篇 光学工程
    • 1,392 篇 电子科学与技术(可...
    • 985 篇 化学工程与技术
    • 776 篇 机械工程
    • 676 篇 仪器科学与技术
    • 652 篇 材料科学与工程(可...
    • 652 篇 动力工程及工程热...
    • 546 篇 安全科学与工程
    • 528 篇 网络空间安全
  • 10,242 篇 理学
    • 4,774 篇 数学
    • 3,144 篇 物理学
    • 3,003 篇 生物学
    • 1,918 篇 统计学(可授理学、...
    • 1,228 篇 化学
    • 862 篇 系统科学
  • 4,194 篇 管理学
    • 2,274 篇 管理科学与工程(可...
    • 2,078 篇 图书情报与档案管...
    • 1,357 篇 工商管理
  • 2,176 篇 医学
    • 1,749 篇 临床医学
    • 1,537 篇 基础医学(可授医学...
    • 818 篇 药学(可授医学、理...
    • 807 篇 公共卫生与预防医...
  • 825 篇 法学
    • 720 篇 社会学
  • 490 篇 经济学
  • 455 篇 农学
  • 445 篇 教育学
  • 94 篇 文学
  • 32 篇 军事学
  • 26 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 726 篇 deep learning
  • 622 篇 accuracy
  • 559 篇 machine learning
  • 366 篇 training
  • 327 篇 computational mo...
  • 302 篇 computer science
  • 295 篇 internet of thin...
  • 293 篇 support vector m...
  • 275 篇 feature extracti...
  • 265 篇 predictive model...
  • 224 篇 convolutional ne...
  • 209 篇 real-time system...
  • 207 篇 data models
  • 206 篇 optimization
  • 202 篇 data mining
  • 199 篇 neural networks
  • 196 篇 reinforcement le...
  • 190 篇 image segmentati...
  • 187 篇 artificial intel...
  • 177 篇 semantics

机构

  • 428 篇 department of ph...
  • 398 篇 iccub universita...
  • 297 篇 university of ch...
  • 297 篇 nikhef national ...
  • 293 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 289 篇 physikalisches i...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 282 篇 horia hulubei na...
  • 280 篇 henryk niewodnic...
  • 279 篇 van swinderen in...
  • 279 篇 departamento de ...

作者

  • 242 篇 barter w.
  • 240 篇 beiter a.
  • 223 篇 bellee v.
  • 217 篇 casse g.
  • 211 篇 bowcock t.j.v.
  • 192 篇 brundu d.
  • 181 篇 blake t.
  • 156 篇 borsato m.
  • 155 篇 betancourt c.
  • 154 篇 baker s.
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 bediaga i.
  • 142 篇 braun s.
  • 142 篇 borisyak m.
  • 142 篇 bizzeti a.

语言

  • 23,327 篇 英文
  • 1,420 篇 其他
  • 117 篇 中文
  • 6 篇 法文
  • 4 篇 德文
  • 4 篇 西班牙文
  • 4 篇 日文
  • 3 篇 斯洛文尼亚文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Data Science Program Computer Science Department"
24853 条 记 录,以下是4661-4670 订阅
排序:
Demo: RxSpatial: A Framework for real-time spatio-temporal operations  10
Demo: RxSpatial: A Framework for real-time spatio-temporal o...
收藏 引用
10th ACM International Conference on Distributed and Event-Based Systems, DEBS 2016
作者: Hendawi, Abdeltawab M. Shi, Youying Fattah, Hossam Karwa, Jumana Ali, Mohamed Department of Computer Science University of Virginia VA United States Center for Data Science Institute of Technology University of Washington WA United States Microsoft Corporation WA United States
Existing commercial database systems provide spatial libraries that support functions on static non-moving spatial objects, e.g., points, linestrings and polygons. Examples of these spatial functions include intersect... 详细信息
来源: 评论
Decision Support Framework: Integrating Analytic Hierarchy Process with Support Vector Machine and Top-K Algorithms
Decision Support Framework: Integrating Analytic Hierarchy P...
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2024
作者: De Jesus, Mervin Jommel T. Ballera, Melvin A. Graduate Program Technological Institute of the Philippines Manila Philippines Department of Computer Science Technological Institute of the Philippines Manila Philippines
Effective recommendation systems are essential for supporting decision-making in various fields in this age of abundant information. This paper presents a novel framework for a Modified Recommender Algorithm that comb... 详细信息
来源: 评论
Lightweight streaming authenticated data structures  22
Lightweight streaming authenticated data structures
收藏 引用
22nd ACM SIGSAC Conference on computer and Communications Security, CCS 2015
作者: Yu, Chia-Mu Department of Computer Science and Engineering Yuan Ze University Taoyuan Taiwan Innovation Center for Big Data and Digital Convergence Taoyuan Taiwan
We develop two novel techniques, FHMT and HWMT, for streaming authenticated data structures to achieve the streaming verifiable computation. By leveraging the computing capability of fully homomorphic encryption, FHMT... 详细信息
来源: 评论
Developing the Role of Firewalls in Enhancing Web Security for Wireless Networks  3
Developing the Role of Firewalls in Enhancing Web Security f...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Narayan, Ritushree Balaji, N.V. Kalanandhini, G. Mahalle, Parikshit N. Wasim, Javed Singh, Roma Usha Martin University Department of Coputing & Information Technology Ranchi India Karpagam Academy of Higher Education Department of Computer Science Coimbatore India Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai India Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India Mangalayatan University Department of Computer Science Aligarh India Himalayan University Department of Computer Science Itanagar India
Firewalls play a critical role in controlling incoming and outgoing community site visitors and shielding a wireless network from malicious assaults. This technical summary focuses on the development of firewalls as a... 详细信息
来源: 评论
PISketch: Finding Persistent and Infrequent Flows  3
PISketch: Finding Persistent and Infrequent Flows
收藏 引用
3rd ACM SIGCOMM 2022 Workshop on Formal Foundations and Security of programmable Network Infrastructures, FFSPIN 2022
作者: Fan, Zhuochen Hu, Zhoujing Wu, Yuhan Guo, Jiarui Liu, Wenrui Yang, Tong Wang, Hengrui Xu, Yifei Uhlig, Steve Tu, Yaofeng School of Computer Science National Engineering Laboratory for Big Data Analysis Technology and Application Peking University China Computer Science Department University of California Los Angeles United States School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom ZTE Corporation China
Finding persistent and inactive activity periods is very helpful in practice, for example to detect intrusion activities. Most of the literature focuses on finding persistent flows or frequent flows. No previous work ... 详细信息
来源: 评论
Physical parameter optimization in swarms of ultra-low complexity agents
Physical parameter optimization in swarms of ultra-low compl...
收藏 引用
7th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2008
作者: Connaughton, Ryan Schermerhorn, Paul Scheutz, Matthias Department of Computer Science and Engineering University of Notre Dame Notre Dame IN 46556 United States Cognitive Science Program Indiana University Bloomington IN 47406 United States
Physical agents (such as wheeled vehicles, UAVs, hovercraft, etc.) with simple control systems are often sensitive to changes in their physical design and control parameters. As such, it is crucial to evaluate the age... 详细信息
来源: 评论
An Evaluation of AI-Driven data Mining Techniques for Large-Scale data Processing  3
An Evaluation of AI-Driven Data Mining Techniques for Large-...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Choudhary, Sheetal Khatoon, Naghma Singh, K. Ranjith Divya, K. Kumar, Santosh D. Gupta, Abhishek Kumar Himalayan University Department of Computer Science Itanagar India Usha Martin University Department of Coputing & Information Technology Ranchi India Karpagam Academy of Higher Education Department of Computer Science Coimbatore India Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai India Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India Mangalayatan University Department of Computer Science Aligarh India
Information mining and synthetic intelligence (AI) have gained a lot interest in recent years in the discipline of large-scale statistics processing. AI-driven statistics mining strategies are especially effective for... 详细信息
来源: 评论
Understanding the Limitations of Secure Shell (SSH) in Wireless Network Security  3
Understanding the Limitations of Secure Shell (SSH) in Wirel...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Upadhyay, Amit Kulkarni, Sandip Roy, Sharmistha Yuvaraj, K. Ashok, V. Kale, Sunil D. Mangalayatan University Department of Computer Science Aligarh India Himalayan University Department of Computer Science Itanagar India Usha Martin University Department of Coputing & Information Technology Ranchi India Karpagam Academy of Higher Education Department of Computer Science Coimbatore India Prince Shri Venkateshwara Padmavathy Engineering College Department of Mechanical Engineering Chennai India Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India
comfy Shell (SSH) is an effective community protocol used to securely connect devices over a computer community. It gives information encryption for relaxed conversation among clients and servers, and can be used to g... 详细信息
来源: 评论
A treasure hunting learning model for students studying history and culture in the field with cellphone
A treasure hunting learning model for students studying hist...
收藏 引用
6th International Conference on Advanced Learning Technologies, ICALT 2006
作者: Chang, Alex Chang, Maiga Hsieh, Athena Department of Information and Computer Engineering Chung-Yuan Christian University National Science and Technology Program for E-learning Taiwan
In the treasure hunting process, the hunters could only get few hints with simple words, therefore they must think over with the experience they learned before. The goal of this paper is to propose a treasure hunting ... 详细信息
来源: 评论
MPEG-DASH Multi-View Video and Audio Transmission QoE Over HTTP/2 Stream
MPEG-DASH Multi-View Video and Audio Transmission QoE Over H...
收藏 引用
2024 International Conference on Advanced Technologies for Communications, ATC 2024
作者: Wakayama, Yamato Nunome, Toshiro Graduate School of Engineering Nagoya Institute of Technology Computer Science Program Department of Engineering Nagoya466-8555 Japan
In this paper, we consider multi-view video and audio streaming using MPEG-DASH, which enables to transmit video tailored to the network conditions over HTTP communication. This paper uses HTTP/2 instead of HTTP/1.1, ... 详细信息
来源: 评论